GREATER THAN EVER. TODAY, RISK OF DATA FALLING IN THE WRONG HANDS IS QUITE OFTEN THIS RISK IS NOT FROM EXTERNAL ATTACKERS. IT COMES FROM WITHIN.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Build /15/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
Microsoft Ignite /16/2017 2:48 PM
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Build /16/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
ITUser Enterprise Mobility Suite Identify and authorize user Apply device policies Apply application policies Apply content policies Active Directory.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’
SIM318. Protect Sensitive Information Reduce risk associated with information leaks Improve regulatory compliance Centrally manage information protection.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Empowering Your Users-Security & Mobility Bil Martin 1.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
One Drive for Business: More Than a File Share Erica Toelle
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Secure your complete data lifecycle using Azure Information Protection
The time to address enterprise mobility is now
How to Define a Successful Mobility Strategy
Conduct a successful pilot deployment of Microsoft Intune
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Mobile Device Management options in Office 365 and beyond
The power of common identity across any cloud
Protect sensitive information with Office 365 DLP
The Information Protection Problem
Power BI Security Best Practices
Secure your complete data lifecycle using Azure Information Protection
WINDOWS INFORMATION PROTECTION OVERVIEW
Microsoft Intune MAM without Device Enrollment
Introduction to Soonr by ….
Application Delivery & MAM Policy
Protect your OneDrive and SharePoint files on mobile devices
Deploying & managing Windows Information Protection (WIP)
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
11/27/ :16 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Strengthening the GDPR business opportunity with Microsoft 365
Microsoft Data Insights Summit
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

GREATER THAN EVER. TODAY, RISK OF DATA FALLING IN THE WRONG HANDS IS QUITE OFTEN THIS RISK IS NOT FROM EXTERNAL ATTACKERS. IT COMES FROM WITHIN. MAJORITY OF DATA LEAKS HAPPEN ACCIDENTALLY.

“An employee of the department had inadvertently disclosed the passport numbers, visa details and other personal identifiers of the world leaders attending the G20 summit in Brisbane after an was mistakenly sent to an organizer of the Asian Cup football tournament because of an autocomplete function” Personal details of world leaders accidentally revealed by G20 organizers Guardian March 30, 2015 AUSTRALIAN IMMIGRATION DEPT. DATA LEAK

2 HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012 Have accidentally sent sensitive information to the wrong person 1 58% …of senior managers admit to regularly uploading work files to a personal or cloud account 1 87% Average per record cost of a data breach across all industries 2 $240 PER RECORD 1 Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013

??? % ? …focus on data leak prevention for personal devices, but ignore the issue on corporate owned devices where the risks are the same or worse. ? ? ? ? ?

DEVICE PROTECTION BitLocker enhancements in Windows 8.1 InstantGo 3 rd party adoption Protect data when device is lost or stolen DATA PROTECTION Rights Management Services (RMS) Office Information Rights Management (IRM) Azure AD, Azure Rights Management in 2013 Protect data when ….. THE GAP Accidental data leakage3 rd party solutions

HOW OTHERS ARE FILLING THE GAP: PAIN POINTS

FINDING THE BALANCE OR

OUR VISION

DATA PROTECTON IN A CLOUD & MOBILE WORLD Protection everywhere (at rest, in transit, across devices, storage location...everywhere) Enable wipe and other management fundamentals Supported by all the apps you use, fully integrated experience REQUIRES

Corp data identifiable from personal Protects data at rest, and when roaming Platform integrated, no mode switching Only IT-Allowed apps see business data IT controls keys, can remote wipe Common experience, x-plat support

Blocks read when screen is locked Optional screen lock security policy System tosses decryption key on lock Can encrypt new files and data Logon, unlock restores keys and access Helps mitigates system level attacks

1 User 2 PROVISIONING: KEYS AND POLICIES

Lync Facebook OneDrive for BusinessContactsWhatsApp PowerPointCalendarOneDrive PDF ReaderPhotosWeather Business Apps & Data (Managed) Personal Apps & Data (Unmanaged) Data exchange is blocked or audited

User DATA INGRESS

User DATA EGRESS

User DATA EGRESS

User CROSS PLATFORM DATA SHARING Common MDM support across Windows, iOS & Android with Microsoft Intune Common developer experience across platforms iOS & Android enabled via Intune App Wrapping Tool for IT Pros iOS & Android apps enabled via Intune App SDK Microsoft Intune SDK for iOS & Android

User REVOKE

Protect data is shared SHARING PROTECTION DEVICE PROTECTION Protect data when device is lost or stolen DATA PROTECTION Accidental data leakage

Protect data is shared SHARING PROTECTION DEVICE PROTECTION Protect data when device is lost or stolen DATA PROTECTION Accidental data leakage

Next Steps Talk to your MDM server vendor about Windows 10 support Check out related sessions to learn more – See resources on the next slide Evaluate Data Protection enhancements in Windows 10 – talk to your TAP buddy! Give us feedback!